{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:19:22Z","timestamp":1772767162641,"version":"3.50.1"},"reference-count":48,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2015,6,15]],"date-time":"2015-06-15T00:00:00Z","timestamp":1434326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6,15]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 This paper aims to explore the prevalence rate of adolescents engaging in aggressive behaviours towards their peers using the Internet and mobile phones, while examining the duration and intensity of this cyberbullying, and to analyse differences in cyberbullying behaviours based on gender and age (academic grades). Research on cyberbullying indicates that it is a global problem that is increasing dramatically among adolescents.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 The sample was composed of 1,415 Spanish adolescents of both sexes (760 boys and 655 girls) between 12 and 17 years old (M = 13.9 years old; SD = 1.4).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 The results indicated that the cyberbullying prevalence among adolescents in the past year was 32 per cent. Likewise, the data suggest that boys and students in their fourth year of secondary education (15-17 years old) perpetrated cyberbullying on their peers more than girls and students in lower grades.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>\u2013 The results presented in this research should be interpreted with caution due to its cross-sectional nature; a longitudinal study with measurements at different times would help to confirm the results observed here. On the other hand, in this study, the adolescents\u2019 responses were obtained through self-reports and, although they could be subject to social desirability effects and biases, as indicated by Flisher<jats:italic>et al.<\/jats:italic>(2004), the reliability and validity of adolescent self-reports in the measurement of risk behaviours were quite acceptable.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>\u2013 It is of crucial importance to develop educational strategies designed to favour the responsible use of the new technologies. In many cases, children and adolescents are not aware of psychological and legal consequences that their cyber-aggressions can have on themselves, on the victims and on their families and social environment.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Social implications<\/jats:title><jats:p>\u2013 The authors feel that this research may contribute to clarifying some crucial issues related to the growing problem of cyberbullying that affects adolescents in many countries of the world. As the present research deals with aspects of interactive technology and smart education, the authors believe that the findings reported in the manuscript would be of interest to potential readers of this<jats:italic>Journal<\/jats:italic>.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 This paper is an original perspective on cyberbullying aggressors among secondary education students in a Spanish context.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itse-08-2014-0025","type":"journal-article","created":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T04:35:46Z","timestamp":1433133346000},"page":"100-115","source":"Crossref","is-referenced-by-count":20,"title":["Cyberbullying aggressors among Spanish secondary education students: an exploratory study"],"prefix":"10.1108","volume":"12","author":[{"given":"Sof\u00eda","family":"Buelga","sequence":"first","affiliation":[]},{"given":"Maria J.","family":"Cava","sequence":"additional","affiliation":[]},{"given":"Gonzalo","family":"Musitu","sequence":"additional","affiliation":[]},{"given":"Eva","family":"Torralba","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122322565943200_b1","doi-asserted-by":"crossref","unstructured":"\u00c1lvarez-Garc\u00eda, D. , Dobarro, A. and N\u00fa\u00f1ez, J.C. (2015), \u201cValidez y fiabilidad del Cuestionario de cibervictimizaci\u00f3n en estudiantes de Secundaria\u201d, Aula Abierta , Vol. 43 No. 1, pp. 32-38, available at: www.sciencedirect.com\/science\/article\/pii\/S0210277314000298 (accessed 2 February 2015).","DOI":"10.1016\/j.aula.2014.11.001"},{"key":"key2020122322565943200_b2","doi-asserted-by":"crossref","unstructured":"Barlett, C. and Coyne, S.M. (2014), \u201cA meta-analysis of sex differences in cyberbullying behavior: the moderating role of age\u201d, Aggressive Behavior , Vol. 40 No. 5, pp. 474-488, available at: http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ab.21555\/abstract (accessed 2 February 2015).","DOI":"10.1002\/ab.21555"},{"key":"key2020122322565943200_b3","doi-asserted-by":"crossref","unstructured":"Bauman, S. , Toomey, R.B. and Walker, J.L. (2013), \u201cAssociations among bullying, cyberbullying, and suicide in high school students\u201d, Journal of Adolescence , Vol. 36 No. 2, pp. 341-350, available at: http:\/\/dx.doi.org\/10.1016\/j.adolescence.2012.12.001 (accessed 28 January 2014).","DOI":"10.1016\/j.adolescence.2012.12.001"},{"key":"key2020122322565943200_b4","unstructured":"Beltr\u00e1n, N.P. , Guilera, G. and Gil, J.A. (2014), \u201cVictimizaci\u00f3n infanto-juvenil en Espa\u00f1a: una revisi\u00f3n sistem\u00e1tica de estudios epidemiol\u00f3gicos\u201d, Papeles del Psic\u00f3logo , Vol. 35 No. 1, pp. 66-77, available at: http:\/\/dialnet.unirioja.es\/servlet\/articulo?codigo=4600733 (accessed 2 February 2015)."},{"key":"key2020122322565943200_b5","doi-asserted-by":"crossref","unstructured":"Bickham, D.S. and Rich, M. (2009), \u201cGlobal assessment of online threats and intervention opportunities for adolescents\u201d, Journal of Adolescent Health , Vol. 44 No. 2, pp. S24-S25, available at: http:\/\/dx.doi.org\/10.1016\/j.jadohealth.2008.10.053 (accessed 5 March 2014).","DOI":"10.1016\/j.jadohealth.2008.10.053"},{"key":"key2020122322565943200_b6","unstructured":"Buelga, S. , Cava, M.J. and Musitu, G. (2010), \u201cCyberbullying: Adolescent victimization through mobile phone and internet\u201d, Psicothema , Vol. 22 No. 4, pp. 784-789, available at: www.psicothema.com\/PDF\/3802.pdf (accessed 28 January 2014)."},{"key":"key2020122322565943200_b7","doi-asserted-by":"crossref","unstructured":"Buelga, S. , Cava, M.J. and Musitu, G. (2012), \u201cValidation of the adolescent victimization through mobile phone and internet scale\u201d, Pan American Journal of Public Health , Vol. 32 No. 1, pp. 36-42, available at: http:\/\/dx.doi.org\/10.1590\/S1020-49892012000700006 (accessed 28 January 2014).","DOI":"10.1590\/S1020-49892012000700006"},{"key":"key2020122322565943200_b8","doi-asserted-by":"crossref","unstructured":"Calvete, E. , Orue, I. , Est\u00e9vez, A. , Villard\u00f3n, L. and Padilla, P. (2010), \u201cCyberbullying in adolescents: modalities and aggressors\u2019 profile\u201d, Computers in Human Behaviour , Vol. 26 No. 5, pp. 1128-1135, available at: http:\/\/dx.doi.org\/10.1016\/j.chb.2010.03.017 (accessed 22 February 2015).","DOI":"10.1016\/j.chb.2010.03.017"},{"key":"key2020122322565943200_b9","doi-asserted-by":"crossref","unstructured":"Ch\u00f3liz, M. (2010), \u201cMobile phone addiction: a point of issue\u201d, Addiction , Vol. 105 No. 2, pp. 373-374, available at: http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1360-0443.2009.02854.x\/full (accessed 2 February 2015).","DOI":"10.1111\/j.1360-0443.2009.02854.x"},{"key":"key2020122322565943200_b10","doi-asserted-by":"crossref","unstructured":"Connolly, J. , Hussey, P. and Connolly, R. (2014), \u201cTechnology-enabled bullying and adolescent resistance to report: the need to examine causal factors\u201d, Interactive Technology and Smart Education , Vol. 11 No. 2, pp. 86-98, available at: http:\/\/dx.doi.org\/10.1108\/itse-04-2014-0003 (accessed 2 February 2015).","DOI":"10.1108\/ITSE-04-2014-0003"},{"key":"key2020122322565943200_b11","doi-asserted-by":"crossref","unstructured":"David-Ferdon, C. and Hertz, M.F. (2007), \u201cElectronic media, violence and adolescents: an emerging public health problem\u201d, Journal of Adolescent Health , Vol. 41 No. 6, pp. S1-S5, available at: http:\/\/dx.doi.org\/10.1016\/j.jadohealth.2007.08.020 (accessed 5 March 2014).","DOI":"10.1016\/j.jadohealth.2007.08.020"},{"key":"key2020122322565943200_b12","unstructured":"Davison, C.B. and Stein, C.H. (2014), \u201cThe dangers of cyberbullying\u201d, North American Journal of Psychology , Vol. 16 No. 3, pp. 595-606, available at: http:\/\/search.proquest.com\/docview\/1642634186?accountid=14513 (accessed 2 February 2015)."},{"key":"key2020122322565943200_b13","doi-asserted-by":"crossref","unstructured":"Fanti, K.A. , Demetriou, A.G. and Hawa, V.V. (2012), \u201cA longitudinal study of cyberbullying: examining risk and protective factors\u201d, European Journal of Developmental Psychology , Vol. 9 No. 2, pp. 168-181, available at: http:\/\/dx.doi.org\/10.1080\/17405629.2011.643169 (accessed 28 January 2014).","DOI":"10.1080\/17405629.2011.643169"},{"key":"key2020122322565943200_b14","doi-asserted-by":"crossref","unstructured":"Flisher, A.J. , Evans, J. , Muller, M. and Lombard, C. (2004), \u201cBrief report: test-retest reliability of self-reported adolescent risk behaviour\u201d, Journal of Adolescence , Vol. 27 No. 2, pp. 207-212, available at: http:\/\/dx.doi.org\/10.1016\/j.adolescence.2001.10.001 (accessed 5 March 2014).","DOI":"10.1016\/j.adolescence.2001.10.001"},{"key":"key2020122322565943200_b15","unstructured":"Garmendia, M. , Garitaonandia, C. , Mart\u00ednez-Fern\u00e1ndez, G. and Casado, M.A. (2011), Riesgos y seguridad en internet: Los menores espa\u00f1oles en el contexto europeo , University of the Basque Country, Bilbao, Sp, available at: www.ehu.eus\/contenidos\/noticia\/20110328_internet_kids\/es_interkid\/adjuntos\/Informe_Espa%C3%B1a_completo_red.pdf (accessed 28 January 2014)."},{"key":"key2020122322565943200_b16","doi-asserted-by":"crossref","unstructured":"Hinduja, S. and Patchin, J.W. (2008), \u201cCyberbullying: an exploratory analysis of factors related to offending and victimization\u201d, Deviant Behavior , Vol. 29 No. 2, pp. 129-156, available at: http:\/\/dx.doi.org\/10.1080\/01639620701457816 (accessed 28 January 2014).","DOI":"10.1080\/01639620701457816"},{"key":"key2020122322565943200_b17","doi-asserted-by":"crossref","unstructured":"Hinduja, S. and Patchin, J.W. (2010), \u201cBullying, cyberbullying, and suicide\u201d, Archives of Suicide Research , Vol. 14 No. 3, pp. 206-221, available at: http:\/\/dx.doi.org\/10.1080\/13811118.2010.494133 (accessed 28 January 2014).","DOI":"10.1080\/13811118.2010.494133"},{"key":"key2020122322565943200_b18","unstructured":"INE (2013), Encuesta sobre Equipamiento y Uso de Tecnolog\u00edas de Informaci\u00f3n y Comunicaci\u00f3n en los Hogares , Instituto Nacional de Estad\u00edstica, Madrid, available at: www.ine.es\/jaxi\/menu.do?type=pcaxis&path=\/t25\/p450\/base_2011\/a2014\/&file=pcaxis (accessed 2 February 2015)."},{"key":"key2020122322565943200_b19","doi-asserted-by":"crossref","unstructured":"Juvoven, J. and Gross, E.F. (2008), \u201cExtending the school grounds? \u2013 Bullying experiences in cyberspace\u201d, Journal of School Health , Vol. 78 No. 9, pp. 496-505, available at: http:\/\/dx.doi.org\/10.1111\/j.1746-1561.2008.00335.x (accessed 28 January 2014).","DOI":"10.1111\/j.1746-1561.2008.00335.x"},{"key":"key2020122322565943200_b20","doi-asserted-by":"crossref","unstructured":"Katzer, C. , Fetchenhauer, D. and Belschak, F. (2009), \u201cCyberbullying: who are the victims? A comparison of victimization in Internet chatrooms and victimization in school\u201d, Journal of Media Psychology: Theories, Methods, and Applications , Vol. 21 No. 1, pp. 25-36, available at: http:\/\/dx.doi.org\/10.1027\/1864-1105.21.1.25 (accessed 28 January 2014).","DOI":"10.1027\/1864-1105.21.1.25"},{"key":"key2020122322565943200_b21","unstructured":"Keith, S. and Martin, M.E. (2005), \u201cCyber-bullying: creating a culture of respect in a cyber world\u201d, Reclaiming Children & Youth , Vol. 13 No. 4, pp. 224-228, available at: http:\/\/hermes.webster.edu\/browntim\/Cyberbullying%20Project\/cyber-bullying_creating_a_culture_of_respect_in_a_cyber_world.pdf (accessed 5 March 2014)."},{"key":"key2020122322565943200_b22","doi-asserted-by":"crossref","unstructured":"Kowalski, R.M. and Limber, S.P. (2007), \u201cElectronic bullying among middle school students\u201d, Journal of Adolescent Health , Vol. 41 No. 6, pp. S22-S30, available at: http:\/\/dx.doi.org\/10.1016\/j.jadohealth.2007.08.017 (accessed 28 January 2014).","DOI":"10.1016\/j.jadohealth.2007.08.017"},{"key":"key2020122322565943200_b24","doi-asserted-by":"crossref","unstructured":"Kowalski, R.M. , Giumetti, G.W. , Schroeder, A.N. and Lattanner, M.R. (2014), \u201cBullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth\u201d, Psychological Bulletin , Vol. 140 No. 4, 1073-1137, available at: http:\/\/dx.doi.org\/10.1037\/a0035618 (accessed 2 February 2015).","DOI":"10.1037\/a0035618"},{"key":"key2020122322565943200_b23","doi-asserted-by":"crossref","unstructured":"Kowalski, R.M. , Morgan, C.A. and Limber, S.P. (2012), \u201cTraditional bullying as a potential warning sign of cyberbullying\u201d, School Psychology International , Vol. 33 No. 5, pp. 505-519, available at: http:\/\/dx.doi.org\/10.1177\/0143034312445244 (accessed 28 January 2014).","DOI":"10.1177\/0143034312445244"},{"key":"key2020122322565943200_b25","doi-asserted-by":"crossref","unstructured":"Kubiszewski, V. , Fontaine, R. , Potard, C. and Auzoult, L. (2015), \u201cDoes cyberbullying overlap with school bullying when taking modality of involvement into account?\u201d, Computers in Human Behavior , Vol. 43 No. 1, pp. 49-57, available at: http:\/\/dx.doi.org\/10.1016\/j.chb.2014.10.049 (accessed 2 February 2015).","DOI":"10.1016\/j.chb.2014.10.049"},{"key":"key2020122322565943200_b26","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez-Pecino, R. and Dur\u00e1n-Segura, M. (2015), \u201cCyberbullying through mobile phone and the internet in dating relationships among youth people\u201d, Comunicar , Vol. 22 No. 44, pp. 159-167, available at: http:\/\/dx.doi.org\/10.3916\/C44-2015-17 (accessed 2 February 2015).","DOI":"10.3916\/C44-2015-17"},{"key":"key2020122322565943200_b28","doi-asserted-by":"crossref","unstructured":"Navarro, R. , Serna, C. , Mart\u00ednez, V. and Ruiz-Oliva, R. (2013), \u201cThe role of Internet use and parental mediation on cyberbullying victimization among Spanish children from rural public schools\u201d, European Journal of Psychology of Education , Vol. 28 No. 3, pp. 725-745, available at: http:\/\/dx.doi.org\/10.1007\/s10212-012-0137-2 (accessed 28 January 2014).","DOI":"10.1007\/s10212-012-0137-2"},{"key":"key2020122322565943200_b27","doi-asserted-by":"crossref","unstructured":"Navarro, R. , Yubero, S. , Larra\u00f1aga, E. and Mart\u00ednez, V. (2012), \u201cChildren\u2019s cyberbullying victimization: associations with social anxiety and social competence in a Spanish sample\u201d, Child Indicators Research , Vol. 5 No. 2, pp. 281-295, available at: http:\/\/dx.doi.org\/10.1007\/s12187-011-9132-4 (accessed 28 January 2014).","DOI":"10.1007\/s12187-011-9132-4"},{"key":"key2020122322565943200_b29","doi-asserted-by":"crossref","unstructured":"Olweus, D. (2013), \u201cSchool bullying: development and some important challenges\u201d, Annual Review of Clinical Psychology , Vol. 9 No. 1, pp. 751-780, available at: www.ncbi.nlm.nih.gov\/pubmed\/23297789 (accessed 28 January 2014).","DOI":"10.1146\/annurev-clinpsy-050212-185516"},{"key":"key2020122322565943200_b30","unstructured":"Ortega, R. , Calmaestra, J. and Mora-Merch\u00e1n, J.A. (2008), \u201cCyberbullying\u201d, International Journal of Psychology and Psychological Therapy , Vol. 8 No. 2, pp. 183-192, available at: www.ijpsy.com\/volumen8\/num2\/194.html (accessed 5 March 2014)."},{"key":"key2020122322565943200_b31","doi-asserted-by":"crossref","unstructured":"Patchin, J.W. and Hinduja, S. (2010), \u201cChanges in adolescent online social networking behaviors from 2006 to 2009\u201d, Computers in Human Behavior , Vol. 26 No. 6, pp. 1818-1821, available at: http:\/\/dx.doi.org\/10.1016\/j.chb.2010.07.009 (accessed 28 January 2014).","DOI":"10.1016\/j.chb.2010.07.009"},{"key":"key2020122322565943200_b48","unstructured":"Pereda, N. , Guilera, G. and Abad, J. (2014), \u201cChildhood and youth victimization in Spain: a systematic review of epidemiological studies\u201d, Papeles del Psic\u00f3logo , Vol. 35 No. 1, pp. 66-77, available at: www.papelesdelpsicologo.es\/english\/2323.pdf (accessed 5 March 2014)."},{"key":"key2020122322565943200_b32","doi-asserted-by":"crossref","unstructured":"Popovic-Citic, B. , Djuric, S. and Cvetkovic, V. (2011), \u201cThe prevalence of cyberbullying among adolescents: a case study of middle schools in Serbia\u201d, School Psychology International , Vol. 32 No. 4, pp. 412-424, available at: http:\/\/dx.doi.org\/10.1177\/0143034311401700 (accessed 28 January 2014).","DOI":"10.1177\/0143034311401700"},{"key":"key2020122322565943200_b33","doi-asserted-by":"crossref","unstructured":"Povedano, A. , Est\u00e9vez, E. , Mart\u00ednez, B. and Monreal, M.C. (2012), \u201cA psychosocial profile of adolescent aggressors and school victims: analysis of gender differences\u201d, Revista de Psicolog\u00eda Social , Vol. 27 No. 2, pp. 169-182, available at: www.academia.edu\/7799534\/A_psychosocial_profile_of_adolescent_aggressors_and_school_victims_Analysis_of_gender_differences (accessed 28 January 2014).","DOI":"10.1174\/021347412800337906"},{"key":"key2020122322565943200_b34","doi-asserted-by":"crossref","unstructured":"Sakellariou, T. , Carroll, A. and Houghton, S. (2012), \u201cRates of cyber victimization and bullying among male Australian primary and high school students\u201d, School Psychology International , Vol. 33 No. 5, pp. 533-549, available at: http:\/\/dx.doi.org\/10.1177\/0143034311430374 (accessed 28 January 2014).","DOI":"10.1177\/0143034311430374"},{"key":"key2020122322565943200_b35","doi-asserted-by":"crossref","unstructured":"Schoffstall, C.L. and Cohen, R. (2011), \u201cCyber aggression: the relation between online offenders and offline social competence\u201d, Social Development , Vol. 20 No. 1, pp. 587-604, available at: http:\/\/dx.doi.org\/10.1111\/j.1467-9507.2011.00609.x (accessed 28 January 2014).","DOI":"10.1111\/j.1467-9507.2011.00609.x"},{"key":"key2020122322565943200_b36","doi-asserted-by":"crossref","unstructured":"Slonje, R. , Smith, P.K. and Frisen, A. (2012), \u201cProcesses of cyberbullying, and feelings of remorse by bullies: a pilot study\u201d, European Journal of Developmental Psychology , Vol. 9 No. 2, pp. 244-259, available at: http:\/\/dx.doi.org\/10.1080\/17405629.2011.643670 (accessed 28 January 2014).","DOI":"10.1080\/17405629.2011.643670"},{"key":"key2020122322565943200_b37","unstructured":"Smith, P.K. , Mahdavi, J. , Carvalho, M. and Tippet, N. (2006), \u201cAn investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying\u201d, Research Brief No. RBX03-06, DfES, London, available at: www.northampton.ac.uk\/behaviour2learn\/Lists\/Downloads\/67-rbx03-06.pdf (accessed 28 January 2014)."},{"key":"key2020122322565943200_b38","doi-asserted-by":"crossref","unstructured":"Spears, B.A. , Taddeo, C.M. , Daly, A.L. , Stretton, A. and Karklins, L.T. (2015), \u201cCyberbullying, help-seeking and mental health in young Australians: Implications for public health\u201d, International Journal of Public Health , Vol. 4 No. 1, available at: http:\/\/dx.doi.org\/10.1007\/s00038-014-0642-y (accessed 2 February 2015).","DOI":"10.1007\/s00038-014-0642-y"},{"key":"key2020122322565943200_b39","doi-asserted-by":"crossref","unstructured":"Tapper, K. and Boulton, M.J. (2004), \u201cSex differences in levels of physical, verbal and indirect aggression among primary school children and their associations with beliefs about aggression\u201d, Aggressive Behaviour , Vol. 30 No. 2, pp. 123-145, available at: http:\/\/dx.doi.org\/10.1002\/ab.20010 (accessed 28 January 2014).","DOI":"10.1002\/ab.20010"},{"key":"key2020122322565943200_b40","doi-asserted-by":"crossref","unstructured":"Tokunaga, R.S. (2010), \u201cFollowing you home from school: a critical review and synthesis of research on cyberbullying victimization\u201d, Computers in Human Behavior , Vol. 26 No. 3, pp. 277-287, available at: http:\/\/dx.doi.org\/10.1016\/j.chb.2009.11.014 (accessed 5 March 2014).","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"key2020122322565943200_b41","unstructured":"UIT (2013), Medici\u00f3n de la Sociedad de la Informaci\u00f3n: Resumen ejecutivo , Uni\u00f3n Internacional de Telecomunicaciones, Ginebra, available at: www.antel.com.uy\/wps\/wcm\/connect\/81efd5804162548999f499620306cc2c\/MIS2013-exec-sum_S.pdf?MOD=AJPERES (accessed 2 February 2015)."},{"key":"key2020122322565943200_b42","doi-asserted-by":"crossref","unstructured":"Vazsonyi, A.T. , Machackova, H. , Sevcikova, A. , Smahel, D. and Cerna, A. (2012), \u201cCyberbullying in context: direct and indirect effects by low self-control across 25 European countries\u201d, European Journal of Developmental Psychology , Vol. 9 No. 2, pp. 210-227, available at: http:\/\/dx.doi.org\/10.1080\/17405629.2011.644919 (accessed 28 January 2014).","DOI":"10.1080\/17405629.2011.644919"},{"key":"key2020122322565943200_b43","doi-asserted-by":"crossref","unstructured":"von Mar\u00e9es, N. and Petermann, F. (2012), \u201cCyberbullying: an increasing challenge for schools\u201d, School Psychology International , Vol. 33 No. 5, pp. 467-476, available at: http:\/\/dx.doi.org\/10.1177\/0143034312445241 (accessed 28 January 2014).","DOI":"10.1177\/0143034312445241"},{"key":"key2020122322565943200_b44","unstructured":"Willard, N.E. (2006), Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats and Distress , Research Press, Champaign, available at: www.researchpress.com\/books\/495\/cyberbullying-and-cyberthreats (accessed 28 January 2014)."},{"key":"key2020122322565943200_b45","doi-asserted-by":"crossref","unstructured":"Willard, N.E. (2007), \u201cThe authority and responsibility of school officials in responding to cyberbullying\u201d, Journal of Adolescent Health , Vol. 41 No. 6, pp. S64-S65, available at: http:\/\/dx.doi.org\/10.1016\/j.jadohealth.2007.08.013 (accessed 28 January 2014).","DOI":"10.1016\/j.jadohealth.2007.08.013"},{"key":"key2020122322565943200_b46","doi-asserted-by":"crossref","unstructured":"Ybarra, M.L. and Mitchell, K.J. (2007), \u201cPrevalence and frequency of internet harassment instigation: implications for adolescent health\u201d, Journal of Adolescent Health , Vol. 41 No. 2, pp. 189-195, available at: http:\/\/dx.doi.org\/10.1016\/j.jadohealth.2007.03.005 (accessed 5 March 2014).","DOI":"10.1016\/j.jadohealth.2007.03.005"},{"key":"key2020122322565943200_b47","doi-asserted-by":"crossref","unstructured":"Yilmaz, H. (2011), \u201cCyberbullying in Turkish middle schools: an exploratory study\u201d, School Psychology International , Vol. 32 No. 6, pp. 645-654, available at: http:\/\/dx.doi.org\/10.1177\/0143034311410262 (accessed 28 January 2014).","DOI":"10.1177\/0143034311410262"}],"container-title":["Interactive Technology and Smart Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ITSE-08-2014-0025","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITSE-08-2014-0025\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITSE-08-2014-0025\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:56:49Z","timestamp":1753394209000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itse\/article\/12\/2\/100-115\/177191"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,15]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6,15]]}},"alternative-id":["10.1108\/ITSE-08-2014-0025"],"URL":"https:\/\/doi.org\/10.1108\/itse-08-2014-0025","relation":{},"ISSN":["1741-5659"],"issn-type":[{"value":"1741-5659","type":"print"}],"subject":[],"published":{"date-parts":[[2015,6,15]]}}}